9 research outputs found

    GABUNGAN SLT-DCT UNTUK STEGANOGRAFI PENGAMANAN DATA GAMBAR PENYAKIT

    Get PDF
    Makalah ini mengusulkan metode steganografi untuk mengamankan data gambar penyakit. Data gambar penyakit yang digunakan sebagai gambar induk merupakan hasil CT-Scan dan endokopi, yaitu brain.jpg dan endoscopic.jpg. dalam makalah ini, SLT dan DCT dipilih sebagai algoritma dalam pengamanan data gambar penyakit. DCT diketahui mempunyai kapasitas kompresi gambar yang lebih baik dibanding dengan DWT, sedangkan SLT merupakan pengembangan dari DWT.  SLT mempunyai waktu tempuh yang lebih baik dibanding DWT dan mempunyai pemadatan energy lebih baik dari DCT, sehingga SLT dinilai dapat menutup kelemahan DCT dan gabungan dari SLT-DCT dapat menghasilkan nilai PNSR lebih tinggi dibanding DWT atau DWT-DCT. Hasil eksperimen telah membuktikan bahwa SLT-DCT menghasilkan imperceptibility yang baik sehingga tidak dapat dibedakan dengan gambar aslinya secara kasat mata dengan batas standar yaitu 30dB. Hal ini dibuktikan dengan perolehan PSNR dari kedua gambar penyakit yang digunakan yaitu brain.jpg 30,7012 dB dan endoscopic,jpg 32,6842 dB. Kata Kunci: Steganografi, Discrete Wavelet Transform, Discrete Cosine Transform, Slantlet Transform, Peak Signal to Noise Ratio

    A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography

    Get PDF
    This paper presents a new technique for transmitting secret information securely from one party to another by embedding this information into a video after encryption through salt cryptography. We have tried to utilize the advantages of salt cryptography which has been ignored by data hiding community. In this encryption method some random data is added to the secret keys and passwords. We will define this random data as a salt which is needed to access the encrypted data, along with the password. Alone these passwords have no use since they will be able to locate the hidden data only when mixed with proper salt. This salt is managed by a certified third party. Different salt is created for different pairs of communicating parties. The purpose of salt is to add arbitrary random data to the string being hashed, such that you increase the length of input to hash. We have also introduced the concept of Enterprise Dependent Value (EDD), which are the embedding values corresponding to the binary digits and are specific to the communicating enterprises. The effectiveness of the techniques has been shown through experimental results. The performance of the proposed technique has been compared with the other techniques of watermarking, steganography and encryption. Keywords: Cryptography, Decryption , Encryption , Salt, Steganography , Video watermarkin

    Hybrid Transform Technique for Robust Steganography on Red Component

    Get PDF
    The dynamic field of image steganography is witnessing remarkable advancements with the introduction of sophisticated techniques designed to bolster the security of digital data. A novel approach that has garnered attention involves leveraging grayscale picture steganography within the YIQ color space, aiming to provide a more secure method for protecting images. This innovative strategy necessitates the conversion of the carrier image from the conventional RGB color space to the YIQ color space, a process pivotal for the successful application of this steganographic method. The YIQ color space is particularly suited for this purpose due to its structure, which separates the luminance component (Y) from the chrominance components (I and Q). This separation is advantageous for steganography as it allows for the embedding of sensitive information within the luminance component, thus minimizing the impact on the image's color attributes. By converting sensitive information into a grayscale image, this method ensures that the data can be discreetly embedded into the Y component of the YIQ color space. The integrity of the I and Q components is preserved during this process, maintaining the original color characteristics of the carrier image while securely concealing the information. A crucial aspect of this approach is the use of a reliable steganographic technique during the embedding process. This technique must ensure that the grayscale image is seamlessly integrated into the Y component without compromising the quality of the carrier image. The effectiveness of this method is measured through two critical metrics: the Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE). High PSNR values indicate a high degree of similarity between the original and the stego image, suggesting that the embedding process has minimally affected the image quality. Simultaneously, minimal MSE values reflect the low error rate in the reconstructed image, further affirming the method's ability to maintain the integrity of the original image. The proposed algorithm, which utilizes grayscale image steganography within the YIQ color space, represents a significant advancement in enhancing the security of digital communications. By ensuring high PSNR and low MSE in the extracted image, this method demonstrates its efficacy in concealing sensitive information while preserving the visual quality of the carrier image. As such, it opens new avenues for the development of secure communication techniques, underscoring the potential for continued innovation in the field of steganography. This approach not only enhances current communication security protocols but also lays the groundwork for future exploration and development in this ever-evolving domain

    Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES)

    Get PDF
    Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai tingkat keamanan yang baik salah satunya yaitu Data Encryption Standard (DES). DES melakukan enkripsi dengan kunci simteris dengan panjang 64 bit kunci yang didapat dari kunci eksternal. Beberapa penelitian sebelumnya telah menggunakan DES pada media teks, dalam makalah ini DES akan digunakan pada media gambar. Gambar yang digunakan berukuran 512x512 piksel, dengan pesan berupa file .txt dengan panjang bervariasi antara 8 byte sampai dengan 1024 byte. Penggunaan file pesan yang bervariasi digunakan untuk mengetahui performa DES, baik dari segi waktu enkripsi dan dekripsi maupun hasil proses dekripsi. Hasil eksperimen menggunakan sejumlah pesan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) tertinggi 86.7532 dB, dan waktu enkripsi pesan dengan ukuran kurang dari 64 bit tidak lebih dari 1 detik, sedangkan waktu dekripsi lebih cepat disbanding waktu enkripsi

    Robust Digital Image Steganography Within Coefficient Difference On Integer Haar Wavelet Transform

    Get PDF
    The development of digital information has lead to increasing demands on information security technology in order to protect the confidentiality of information. Digital steganography is one of technologies that is capable of protecting the information from unauthorized interception. It is due to its capability to hide the embedded of the information without attracting the eavesdropper’s attention. Among digital media, digital image is the most widely used medium for steganography. Discrete Cosine Transform (DCT) is a well known technique in digital image steganography. The use of DCT on small blocks may pose blocking effects and unintended artifacts on the overall image. These disadvantages of DCT can be eliminated by using Discrete Wavelet Transform (DWT) which is more compatible with the Human Visual System (HVS). However the floating point of DWT can causes some loss of information. On the other hand, Integer Wavelet Transform (IWT) represented in finite precision can avoid the problem of floating point precision in DWT. In this paper, the messages are embedded on the 1-level Integer Haar Wavelet Transform (IHWT) using coefficient difference scheme that is adopted from Pixel Value Differencing (PVD). The messages are embedded on the difference values of two adjacent wavelet coefficients. The result shows that the proposed method can easily outperform the existing method that employ IHWT and Pixel Mapping Method (PMM) in term of imperceptibility as well as the maximum capacity

    Integration of biometrics and steganography: A comprehensive review

    Get PDF
    The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards

    A Review on Steganography Techniques

    Get PDF
    Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. Therefore, this paper presents most of the recent works that have been conducted on image steganography field and analyzes them to clarify the strength and weakness points in each work separately in order to be taken in consideration for future works in such field.   

    implementasi metode spread spectrum dan kriptografi rsa dalam penyembunyian pesan pada citra digital berbasis android

    Get PDF
    Keamanan dalam teknologi komunikasi merupakan salah satu hal penting dalam pertukaran informasi yang memiliki nilai confidentiality yang tinggi. Oleh karena itu, penyembunyian pesan atau steganografi merupakan salah satu metode yang efektif dan dapat digunakan untuk melindungi pesan saat proses pertukaran informasi berlangsung. Spread Spectrum adalah salah satu metode steganografi yang menyembunyikan informasi dengan cara mengubah informasi rahasia ke dalam bentuk noise sebelum disisipkan ke dalam citra digital. Metode Spread Spectrum ini kemudian dikombinasikan dengan kriptografi RSA agar kualitas keamanan data pun meningkat. Aplikasi berbasis android ini dibangun dengan menggunakan bahasa pemrograman Android dan database SQLite. Uji coba dilakukan dengan menggunakan faktor spreading yang berbeda-beda yakni 1 sampai 5 pada 30 sampel gambar dengan ukuran yang sama. Rata-rata nilai PSNR dari hasil uji coba masing-masing faktor spreading adalah 42.52, 42.01, 41.63, 41.29 dan 40.29. Hasil uji coba menunjukkan semakin besar penggunaan faktor spreading akan menurunkan kualitas visual gambar namun akan meningkatkan kualitas kemanan data
    corecore